@pulumi/vault 5.4.0 → 5.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/secretBackend.d.ts +16 -0
- package/ad/secretBackend.js +16 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +62 -18
- package/ad/secretLibrary.js +35 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +22 -0
- package/ad/secretRole.js +22 -0
- package/ad/secretRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +12 -10
- package/approle/authBackendRoleSecretID.js +3 -4
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/aws/authBackendClient.d.ts +14 -0
- package/aws/authBackendClient.js +14 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +14 -0
- package/aws/authBackendStsRole.js +14 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +31 -0
- package/aws/getAccessCredentials.js +31 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/secretBackend.d.ts +12 -0
- package/aws/secretBackend.js +12 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +27 -0
- package/aws/secretBackendRole.js +27 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +16 -0
- package/azure/authBackendConfig.js +16 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/backend.d.ts +33 -0
- package/azure/backend.js +33 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +32 -0
- package/azure/backendRole.js +32 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +40 -0
- package/azure/getAccessCredentials.js +22 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/consul/secretBackend.d.ts +14 -0
- package/consul/secretBackend.js +14 -0
- package/consul/secretBackend.js.map +1 -1
- package/database/secretBackendConnection.d.ts +22 -0
- package/database/secretBackendConnection.js +22 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +27 -0
- package/database/secretBackendRole.js +27 -0
- package/database/secretBackendRole.js.map +1 -1
- package/gcp/secretBackend.d.ts +11 -0
- package/gcp/secretBackend.js +11 -0
- package/gcp/secretBackend.js.map +1 -1
- package/generic/endpoint.d.ts +52 -0
- package/generic/endpoint.js +52 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +15 -0
- package/generic/getSecret.js.map +1 -1
- package/getNomadAccessToken.d.ts +27 -0
- package/getNomadAccessToken.js +27 -0
- package/getNomadAccessToken.js.map +1 -1
- package/identity/entity.d.ts +14 -0
- package/identity/entity.js +14 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +12 -0
- package/identity/entityAlias.js +12 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/getEntity.d.ts +15 -0
- package/identity/getEntity.js +15 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +15 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +21 -0
- package/identity/getOidcClientCreds.js +21 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +28 -0
- package/identity/getOidcOpenidConfig.js +28 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +28 -0
- package/identity/getOidcPublicKeys.js +28 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/oidcKey.d.ts +14 -0
- package/identity/oidcKey.js +14 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +15 -0
- package/identity/oidcKeyAllowedClientID.js +15 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +36 -0
- package/identity/oidcRole.js +36 -0
- package/identity/oidcRole.js.map +1 -1
- package/nomadSecretBackend.d.ts +18 -0
- package/nomadSecretBackend.js +18 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +22 -0
- package/nomadSecretRole.js +22 -0
- package/nomadSecretRole.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/pkisecret/secretBackendCert.d.ts +15 -0
- package/pkisecret/secretBackendCert.js +15 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +63 -0
- package/pkisecret/secretBackendConfigCa.js +63 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +16 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +16 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +13 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +13 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +24 -0
- package/pkisecret/secretBackendRootCert.js +24 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +43 -0
- package/pkisecret/secretBackendSign.js +43 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +37 -0
- package/rabbitmq/secretBackend.js +17 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +31 -0
- package/rabbitmq/secretBackendRole.js +31 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +16 -0
- package/raftSnapshotAgentConfig.js +16 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +13 -0
- package/terraformcloud/secretBackend.js +13 -0
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +23 -0
- package/terraformcloud/secretCreds.js +23 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +18 -0
- package/terraformcloud/secretRole.js +18 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +19 -0
- package/token.js +19 -0
- package/token.js.map +1 -1
|
@@ -1,4 +1,25 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const app = new vault.identity.OidcClient("app", {
|
|
10
|
+
* redirectUris: [
|
|
11
|
+
* "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
12
|
+
* "http://127.0.0.1:8251/callback",
|
|
13
|
+
* "http://127.0.0.1:8080/callback",
|
|
14
|
+
* ],
|
|
15
|
+
* idTokenTtl: 2400,
|
|
16
|
+
* accessTokenTtl: 7200,
|
|
17
|
+
* });
|
|
18
|
+
* const creds = vault.identity.getOidcClientCredsOutput({
|
|
19
|
+
* name: app.name,
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*/
|
|
2
23
|
export declare function getOidcClientCreds(args: GetOidcClientCredsArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcClientCredsResult>;
|
|
3
24
|
/**
|
|
4
25
|
* A collection of arguments for invoking getOidcClientCreds.
|
|
@@ -5,6 +5,27 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.getOidcClientCredsOutput = exports.getOidcClientCreds = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const app = new vault.identity.OidcClient("app", {
|
|
16
|
+
* redirectUris: [
|
|
17
|
+
* "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
18
|
+
* "http://127.0.0.1:8251/callback",
|
|
19
|
+
* "http://127.0.0.1:8080/callback",
|
|
20
|
+
* ],
|
|
21
|
+
* idTokenTtl: 2400,
|
|
22
|
+
* accessTokenTtl: 7200,
|
|
23
|
+
* });
|
|
24
|
+
* const creds = vault.identity.getOidcClientCredsOutput({
|
|
25
|
+
* name: app.name,
|
|
26
|
+
* });
|
|
27
|
+
* ```
|
|
28
|
+
*/
|
|
8
29
|
function getOidcClientCreds(args, opts) {
|
|
9
30
|
if (!opts) {
|
|
10
31
|
opts = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getOidcClientCreds.js","sourceRoot":"","sources":["../../identity/getOidcClientCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sDAAsD,EAAE;QACjF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,gDASC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|
|
1
|
+
{"version":3,"file":"getOidcClientCreds.js","sourceRoot":"","sources":["../../identity/getOidcClientCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sDAAsD,EAAE;QACjF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,gDASC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|
|
@@ -1,4 +1,32 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const key = new vault.identity.OidcKey("key", {
|
|
10
|
+
* allowedClientIds: ["*"],
|
|
11
|
+
* rotationPeriod: 3600,
|
|
12
|
+
* verificationTtl: 3600,
|
|
13
|
+
* });
|
|
14
|
+
* const app = new vault.identity.OidcClient("app", {
|
|
15
|
+
* key: key.name,
|
|
16
|
+
* redirectUris: [
|
|
17
|
+
* "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
18
|
+
* "http://127.0.0.1:8251/callback",
|
|
19
|
+
* "http://127.0.0.1:8080/callback",
|
|
20
|
+
* ],
|
|
21
|
+
* idTokenTtl: 2400,
|
|
22
|
+
* accessTokenTtl: 7200,
|
|
23
|
+
* });
|
|
24
|
+
* const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
|
|
25
|
+
* const config = vault.identity.getOidcOpenidConfigOutput({
|
|
26
|
+
* name: provider.name,
|
|
27
|
+
* });
|
|
28
|
+
* ```
|
|
29
|
+
*/
|
|
2
30
|
export declare function getOidcOpenidConfig(args: GetOidcOpenidConfigArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcOpenidConfigResult>;
|
|
3
31
|
/**
|
|
4
32
|
* A collection of arguments for invoking getOidcOpenidConfig.
|
|
@@ -5,6 +5,34 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.getOidcOpenidConfigOutput = exports.getOidcOpenidConfig = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const key = new vault.identity.OidcKey("key", {
|
|
16
|
+
* allowedClientIds: ["*"],
|
|
17
|
+
* rotationPeriod: 3600,
|
|
18
|
+
* verificationTtl: 3600,
|
|
19
|
+
* });
|
|
20
|
+
* const app = new vault.identity.OidcClient("app", {
|
|
21
|
+
* key: key.name,
|
|
22
|
+
* redirectUris: [
|
|
23
|
+
* "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
24
|
+
* "http://127.0.0.1:8251/callback",
|
|
25
|
+
* "http://127.0.0.1:8080/callback",
|
|
26
|
+
* ],
|
|
27
|
+
* idTokenTtl: 2400,
|
|
28
|
+
* accessTokenTtl: 7200,
|
|
29
|
+
* });
|
|
30
|
+
* const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
|
|
31
|
+
* const config = vault.identity.getOidcOpenidConfigOutput({
|
|
32
|
+
* name: provider.name,
|
|
33
|
+
* });
|
|
34
|
+
* ```
|
|
35
|
+
*/
|
|
8
36
|
function getOidcOpenidConfig(args, opts) {
|
|
9
37
|
if (!opts) {
|
|
10
38
|
opts = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getOidcOpenidConfig.js","sourceRoot":"","sources":["../../identity/getOidcOpenidConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,kDASC;AAyED,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvE,CAAC;AAFD,8DAEC"}
|
|
1
|
+
{"version":3,"file":"getOidcOpenidConfig.js","sourceRoot":"","sources":["../../identity/getOidcOpenidConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,kDASC;AAyED,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvE,CAAC;AAFD,8DAEC"}
|
|
@@ -1,4 +1,32 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const key = new vault.identity.OidcKey("key", {
|
|
10
|
+
* allowedClientIds: ["*"],
|
|
11
|
+
* rotationPeriod: 3600,
|
|
12
|
+
* verificationTtl: 3600,
|
|
13
|
+
* });
|
|
14
|
+
* const app = new vault.identity.OidcClient("app", {
|
|
15
|
+
* key: key.name,
|
|
16
|
+
* redirectUris: [
|
|
17
|
+
* "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
18
|
+
* "http://127.0.0.1:8251/callback",
|
|
19
|
+
* "http://127.0.0.1:8080/callback",
|
|
20
|
+
* ],
|
|
21
|
+
* idTokenTtl: 2400,
|
|
22
|
+
* accessTokenTtl: 7200,
|
|
23
|
+
* });
|
|
24
|
+
* const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
|
|
25
|
+
* const publicKeys = vault.identity.getOidcPublicKeysOutput({
|
|
26
|
+
* name: provider.name,
|
|
27
|
+
* });
|
|
28
|
+
* ```
|
|
29
|
+
*/
|
|
2
30
|
export declare function getOidcPublicKeys(args: GetOidcPublicKeysArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcPublicKeysResult>;
|
|
3
31
|
/**
|
|
4
32
|
* A collection of arguments for invoking getOidcPublicKeys.
|
|
@@ -5,6 +5,34 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.getOidcPublicKeysOutput = exports.getOidcPublicKeys = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const key = new vault.identity.OidcKey("key", {
|
|
16
|
+
* allowedClientIds: ["*"],
|
|
17
|
+
* rotationPeriod: 3600,
|
|
18
|
+
* verificationTtl: 3600,
|
|
19
|
+
* });
|
|
20
|
+
* const app = new vault.identity.OidcClient("app", {
|
|
21
|
+
* key: key.name,
|
|
22
|
+
* redirectUris: [
|
|
23
|
+
* "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
24
|
+
* "http://127.0.0.1:8251/callback",
|
|
25
|
+
* "http://127.0.0.1:8080/callback",
|
|
26
|
+
* ],
|
|
27
|
+
* idTokenTtl: 2400,
|
|
28
|
+
* accessTokenTtl: 7200,
|
|
29
|
+
* });
|
|
30
|
+
* const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
|
|
31
|
+
* const publicKeys = vault.identity.getOidcPublicKeysOutput({
|
|
32
|
+
* name: provider.name,
|
|
33
|
+
* });
|
|
34
|
+
* ```
|
|
35
|
+
*/
|
|
8
36
|
function getOidcPublicKeys(args, opts) {
|
|
9
37
|
if (!opts) {
|
|
10
38
|
opts = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getOidcPublicKeys.js","sourceRoot":"","sources":["../../identity/getOidcPublicKeys.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,iBAAiB,CAAC,IAA2B,EAAE,IAA2B;IACtF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,8CASC;AA4BD,SAAgB,uBAAuB,CAAC,IAAiC,EAAE,IAA2B;IAClG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,iBAAiB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACrE,CAAC;AAFD,0DAEC"}
|
|
1
|
+
{"version":3,"file":"getOidcPublicKeys.js","sourceRoot":"","sources":["../../identity/getOidcPublicKeys.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,SAAgB,iBAAiB,CAAC,IAA2B,EAAE,IAA2B;IACtF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,8CASC;AA4BD,SAAgB,uBAAuB,CAAC,IAAiC,EAAE,IAA2B;IAClG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,iBAAiB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACrE,CAAC;AAFD,0DAEC"}
|
package/identity/oidcKey.d.ts
CHANGED
|
@@ -1,5 +1,19 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
|
|
10
|
+
* const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
|
|
11
|
+
* const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
|
|
12
|
+
* keyName: key.name,
|
|
13
|
+
* allowedClientId: roleOidcRole.clientId,
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*
|
|
3
17
|
* ## Import
|
|
4
18
|
*
|
|
5
19
|
* The key can be imported with the key name, for example
|
package/identity/oidcKey.js
CHANGED
|
@@ -6,6 +6,20 @@ exports.OidcKey = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
|
|
16
|
+
* const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
|
|
17
|
+
* const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
|
|
18
|
+
* keyName: key.name,
|
|
19
|
+
* allowedClientId: roleOidcRole.clientId,
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*
|
|
9
23
|
* ## Import
|
|
10
24
|
*
|
|
11
25
|
* The key can be imported with the key name, for example
|
package/identity/oidcKey.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"oidcKey.js","sourceRoot":"","sources":["../../identity/oidcKey.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"oidcKey.js","sourceRoot":"","sources":["../../identity/oidcKey.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IA4D9C,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;;AA1BL,0BAiFC;AAnEG,gBAAgB;AACO,oBAAY,GAAG,gCAAgC,CAAC"}
|
|
@@ -1,4 +1,19 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
|
|
10
|
+
* const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
|
|
11
|
+
* const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
|
|
12
|
+
* keyName: key.name,
|
|
13
|
+
* allowedClientId: roleOidcRole.clientId,
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*/
|
|
2
17
|
export declare class OidcKeyAllowedClientID extends pulumi.CustomResource {
|
|
3
18
|
/**
|
|
4
19
|
* Get an existing OidcKeyAllowedClientID resource's state with the given name, ID, and optional extra
|
|
@@ -5,6 +5,21 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.OidcKeyAllowedClientID = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
|
|
16
|
+
* const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
|
|
17
|
+
* const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
|
|
18
|
+
* keyName: key.name,
|
|
19
|
+
* allowedClientId: roleOidcRole.clientId,
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*/
|
|
8
23
|
class OidcKeyAllowedClientID extends pulumi.CustomResource {
|
|
9
24
|
constructor(name, argsOrState, opts) {
|
|
10
25
|
let resourceInputs = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"oidcKeyAllowedClientID.js","sourceRoot":"","sources":["../../identity/oidcKeyAllowedClientID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA6C7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IAhED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,8DAA8D,CAAC"}
|
|
1
|
+
{"version":3,"file":"oidcKeyAllowedClientID.js","sourceRoot":"","sources":["../../identity/oidcKeyAllowedClientID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA6C7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IAhED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,8DAA8D,CAAC"}
|
package/identity/oidcRole.d.ts
CHANGED
|
@@ -1,5 +1,41 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* You need to create a role with a named key.
|
|
6
|
+
* At creation time, the key can be created independently of the role. However, the key must
|
|
7
|
+
* exist before the role can be used to issue tokens. You must also configure the key with the
|
|
8
|
+
* role's Client ID to allow the role to use the key.
|
|
9
|
+
*
|
|
10
|
+
* ```typescript
|
|
11
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
12
|
+
* import * as vault from "@pulumi/vault";
|
|
13
|
+
*
|
|
14
|
+
* const config = new pulumi.Config();
|
|
15
|
+
* const key = config.get("key") || "key";
|
|
16
|
+
* const role = new vault.identity.OidcRole("role", {key: key});
|
|
17
|
+
* const keyOidcKey = new vault.identity.OidcKey("keyOidcKey", {
|
|
18
|
+
* algorithm: "RS256",
|
|
19
|
+
* allowedClientIds: [role.clientId],
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*
|
|
23
|
+
* If you want to create the key first before creating the role, you can use a separate
|
|
24
|
+
* resource to configure the allowed Client ID on
|
|
25
|
+
* the key.
|
|
26
|
+
*
|
|
27
|
+
* ```typescript
|
|
28
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
29
|
+
* import * as vault from "@pulumi/vault";
|
|
30
|
+
*
|
|
31
|
+
* const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
|
|
32
|
+
* const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
|
|
33
|
+
* const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
|
|
34
|
+
* keyName: key.name,
|
|
35
|
+
* allowedClientId: roleOidcRole.clientId,
|
|
36
|
+
* });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
3
39
|
* ## Import
|
|
4
40
|
*
|
|
5
41
|
* The key can be imported with the role name, for example
|
package/identity/oidcRole.js
CHANGED
|
@@ -6,6 +6,42 @@ exports.OidcRole = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* You need to create a role with a named key.
|
|
12
|
+
* At creation time, the key can be created independently of the role. However, the key must
|
|
13
|
+
* exist before the role can be used to issue tokens. You must also configure the key with the
|
|
14
|
+
* role's Client ID to allow the role to use the key.
|
|
15
|
+
*
|
|
16
|
+
* ```typescript
|
|
17
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
+
* import * as vault from "@pulumi/vault";
|
|
19
|
+
*
|
|
20
|
+
* const config = new pulumi.Config();
|
|
21
|
+
* const key = config.get("key") || "key";
|
|
22
|
+
* const role = new vault.identity.OidcRole("role", {key: key});
|
|
23
|
+
* const keyOidcKey = new vault.identity.OidcKey("keyOidcKey", {
|
|
24
|
+
* algorithm: "RS256",
|
|
25
|
+
* allowedClientIds: [role.clientId],
|
|
26
|
+
* });
|
|
27
|
+
* ```
|
|
28
|
+
*
|
|
29
|
+
* If you want to create the key first before creating the role, you can use a separate
|
|
30
|
+
* resource to configure the allowed Client ID on
|
|
31
|
+
* the key.
|
|
32
|
+
*
|
|
33
|
+
* ```typescript
|
|
34
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
35
|
+
* import * as vault from "@pulumi/vault";
|
|
36
|
+
*
|
|
37
|
+
* const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
|
|
38
|
+
* const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
|
|
39
|
+
* const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
|
|
40
|
+
* keyName: key.name,
|
|
41
|
+
* allowedClientId: roleOidcRole.clientId,
|
|
42
|
+
* });
|
|
43
|
+
* ```
|
|
44
|
+
*
|
|
9
45
|
* ## Import
|
|
10
46
|
*
|
|
11
47
|
* The key can be imported with the role name, for example
|
package/identity/oidcRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"oidcRole.js","sourceRoot":"","sources":["../../identity/oidcRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"oidcRole.js","sourceRoot":"","sources":["../../identity/oidcRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4CG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IA8D/C,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IApFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AA1BL,4BAsFC;AAxEG,gBAAgB;AACO,qBAAY,GAAG,kCAAkC,CAAC"}
|
package/nomadSecretBackend.d.ts
CHANGED
|
@@ -1,5 +1,23 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const config = new vault.NomadSecretBackend("config", {
|
|
10
|
+
* address: "https://127.0.0.1:4646",
|
|
11
|
+
* backend: "nomad",
|
|
12
|
+
* defaultLeaseTtlSeconds: 3600,
|
|
13
|
+
* description: "test description",
|
|
14
|
+
* maxLeaseTtlSeconds: 7200,
|
|
15
|
+
* maxTtl: 240,
|
|
16
|
+
* token: "ae20ceaa-...",
|
|
17
|
+
* ttl: 120,
|
|
18
|
+
* });
|
|
19
|
+
* ```
|
|
20
|
+
*
|
|
3
21
|
* ## Import
|
|
4
22
|
*
|
|
5
23
|
* Nomad secret backend can be imported using the `backend`, e.g.
|
package/nomadSecretBackend.js
CHANGED
|
@@ -6,6 +6,24 @@ exports.NomadSecretBackend = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const config = new vault.NomadSecretBackend("config", {
|
|
16
|
+
* address: "https://127.0.0.1:4646",
|
|
17
|
+
* backend: "nomad",
|
|
18
|
+
* defaultLeaseTtlSeconds: 3600,
|
|
19
|
+
* description: "test description",
|
|
20
|
+
* maxLeaseTtlSeconds: 7200,
|
|
21
|
+
* maxTtl: 240,
|
|
22
|
+
* token: "ae20ceaa-...",
|
|
23
|
+
* ttl: 120,
|
|
24
|
+
* });
|
|
25
|
+
* ```
|
|
26
|
+
*
|
|
9
27
|
* ## Import
|
|
10
28
|
*
|
|
11
29
|
* Nomad secret backend can be imported using the `backend`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"nomadSecretBackend.js","sourceRoot":"","sources":["../nomadSecretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"nomadSecretBackend.js","sourceRoot":"","sources":["../nomadSecretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IA+FzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAlID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAoIC;AAtHG,gBAAgB;AACO,+BAAY,GAAG,mDAAmD,CAAC"}
|
package/nomadSecretRole.d.ts
CHANGED
|
@@ -1,5 +1,27 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const config = new vault.NomadSecretBackend("config", {
|
|
10
|
+
* backend: "nomad",
|
|
11
|
+
* description: "test description",
|
|
12
|
+
* defaultLeaseTtlSeconds: "3600",
|
|
13
|
+
* maxLeaseTtlSeconds: "7200",
|
|
14
|
+
* address: "https://127.0.0.1:4646",
|
|
15
|
+
* token: "ae20ceaa-...",
|
|
16
|
+
* });
|
|
17
|
+
* const test = new vault.NomadSecretRole("test", {
|
|
18
|
+
* backend: config.backend,
|
|
19
|
+
* role: "test",
|
|
20
|
+
* type: "client",
|
|
21
|
+
* policies: ["readonly"],
|
|
22
|
+
* });
|
|
23
|
+
* ```
|
|
24
|
+
*
|
|
3
25
|
* ## Import
|
|
4
26
|
*
|
|
5
27
|
* Nomad secret role can be imported using the `backend`, e.g.
|
package/nomadSecretRole.js
CHANGED
|
@@ -6,6 +6,28 @@ exports.NomadSecretRole = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const config = new vault.NomadSecretBackend("config", {
|
|
16
|
+
* backend: "nomad",
|
|
17
|
+
* description: "test description",
|
|
18
|
+
* defaultLeaseTtlSeconds: "3600",
|
|
19
|
+
* maxLeaseTtlSeconds: "7200",
|
|
20
|
+
* address: "https://127.0.0.1:4646",
|
|
21
|
+
* token: "ae20ceaa-...",
|
|
22
|
+
* });
|
|
23
|
+
* const test = new vault.NomadSecretRole("test", {
|
|
24
|
+
* backend: config.backend,
|
|
25
|
+
* role: "test",
|
|
26
|
+
* type: "client",
|
|
27
|
+
* policies: ["readonly"],
|
|
28
|
+
* });
|
|
29
|
+
* ```
|
|
30
|
+
*
|
|
9
31
|
* ## Import
|
|
10
32
|
*
|
|
11
33
|
* Nomad secret role can be imported using the `backend`, e.g.
|
package/nomadSecretRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"nomadSecretRole.js","sourceRoot":"","sources":["../nomadSecretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"nomadSecretRole.js","sourceRoot":"","sources":["../nomadSecretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA8DtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAvFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAyFC;AA3EG,gBAAgB;AACO,4BAAY,GAAG,6CAA6C,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.4.
|
|
3
|
+
"version": "v5.4.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.4.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.4.1"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/package.json.dev
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.4.
|
|
3
|
+
"version": "v5.4.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.4.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.4.1"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
|
@@ -1,4 +1,19 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const app = new vault.pkisecret.SecretBackendCert("app", {
|
|
10
|
+
* backend: vault_mount.intermediate.path,
|
|
11
|
+
* commonName: "app.my.domain",
|
|
12
|
+
* }, {
|
|
13
|
+
* dependsOn: [vault_pki_secret_backend_role.admin],
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*/
|
|
2
17
|
export declare class SecretBackendCert extends pulumi.CustomResource {
|
|
3
18
|
/**
|
|
4
19
|
* Get an existing SecretBackendCert resource's state with the given name, ID, and optional extra
|
|
@@ -5,6 +5,21 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.SecretBackendCert = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const app = new vault.pkisecret.SecretBackendCert("app", {
|
|
16
|
+
* backend: vault_mount.intermediate.path,
|
|
17
|
+
* commonName: "app.my.domain",
|
|
18
|
+
* }, {
|
|
19
|
+
* dependsOn: [vault_pki_secret_backend_role.admin],
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*/
|
|
8
23
|
class SecretBackendCert extends pulumi.CustomResource {
|
|
9
24
|
constructor(name, argsOrState, opts) {
|
|
10
25
|
let resourceInputs = {};
|